Vulnerabilites related to jetbrains - ktor
CVE-2022-38180 (GCVE-0-2022-38180)
Vulnerability from cvelistv5
Published
2022-08-12 09:55
Modified
2024-08-03 10:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/3092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.1.0", "status": "affected", "version": "2.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-12T09:55:15", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/3092" } ], "source": { "defect": [ "KTOR-4618" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-38180", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.1.0", "version_value": "2.1.0" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "name": "https://github.com/ktorio/ktor/pull/3092", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/3092" } ] }, "source": { "defect": [ "KTOR-4618" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-38180", "datePublished": "2022-08-12T09:55:15", "dateReserved": "2022-08-12T00:00:00", "dateUpdated": "2024-08-03T10:45:52.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-43203 (GCVE-0-2021-43203)
Vulnerability from cvelistv5
Published
2021-11-09 14:52
Modified
2024-08-04 03:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:47:13.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T14:52:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43203", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43203", "datePublished": "2021-11-09T14:52:23", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-08-04T03:47:13.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-26129 (GCVE-0-2020-26129)
Vulnerability from cvelistv5
Published
2020-11-16 15:09
Modified
2024-08-04 15:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.152Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-16T15:10:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com", "refsource": "MISC", "url": "https://blog.jetbrains.com" }, { "name": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/", "refsource": "CONFIRM", "url": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26129", "datePublished": "2020-11-16T15:09:55", "dateReserved": "2020-09-28T00:00:00", "dateUpdated": "2024-08-04T15:49:07.152Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25762 (GCVE-0-2021-25762)
Vulnerability from cvelistv5
Published
2021-02-03 15:24
Modified
2024-08-03 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:28.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-03T15:24:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-25762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com", "refsource": "MISC", "url": "https://blog.jetbrains.com" }, { "name": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-25762", "datePublished": "2021-02-03T15:24:26", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:28.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29035 (GCVE-0-2022-29035)
Vulnerability from cvelistv5
Published
2022-04-11 18:12
Modified
2024-08-03 06:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-330 - Use of Insufficiently Random Values
Summary
In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren't using SecureRandom implementations
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:58.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/2776" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Native" ], "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.0.0", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Dan Wallach" } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren\u0027t using SecureRandom implementations" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T18:12:35", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/2776" } ], "source": { "defect": [ "KTOR-3656" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-29035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "platform": "Native", "version_affected": "\u003c", "version_name": "2.0.0", "version_value": "2.0.0" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "credit": [ { "lang": "eng", "value": "Dan Wallach" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren\u0027t using SecureRandom implementations" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "name": "https://github.com/ktorio/ktor/pull/2776", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/2776" } ] }, "source": { "defect": [ "KTOR-3656" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-29035", "datePublished": "2022-04-11T18:12:43", "dateReserved": "2022-04-11T00:00:00", "dateUpdated": "2024-08-03T06:10:58.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-38179 (GCVE-0-2022-38179)
Vulnerability from cvelistv5
Published
2022-08-12 09:55
Modified
2024-08-03 10:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-184 - Incomplete Blacklist
Summary
JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/3110" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.1.0", "status": "affected", "version": "2.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-184", "description": "CWE-184 Incomplete Blacklist", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-12T09:55:10", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/3110" } ], "source": { "defect": [ "KTOR-4669" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-38179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.1.0", "version_value": "2.1.0" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-184 Incomplete Blacklist" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "name": "https://github.com/ktorio/ktor/pull/3110", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/3110" } ] }, "source": { "defect": [ "KTOR-4669" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-38179", "datePublished": "2022-08-12T09:55:10", "dateReserved": "2022-08-12T00:00:00", "dateUpdated": "2024-08-03T10:45:52.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-10102 (GCVE-0-2019-10102)
Vulnerability from cvelistv5
Published
2019-07-03 00:00
Modified
2024-08-04 22:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:10:09.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230818-0012/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-18T13:06:32.924060", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/" }, { "url": "https://security.netapp.com/advisory/ntap-20230818-0012/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-10102", "datePublished": "2019-07-03T00:00:00", "dateReserved": "2019-03-26T00:00:00", "dateUpdated": "2024-08-04T22:10:09.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12736 (GCVE-0-2019-12736)
Vulnerability from cvelistv5
Published
2019-10-02 18:48
Modified
2024-08-04 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:54.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-02T18:48:50", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", "refsource": "CONFIRM", "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12736", "datePublished": "2019-10-02T18:48:50", "dateReserved": "2019-06-05T00:00:00", "dateUpdated": "2024-08-04T23:32:54.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-12737 (GCVE-0-2019-12737)
Vulnerability from cvelistv5
Published
2019-10-02 18:47
Modified
2024-08-04 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:54.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-02T18:47:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", "refsource": "CONFIRM", "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12737", "datePublished": "2019-10-02T18:47:48", "dateReserved": "2019-06-05T00:00:00", "dateUpdated": "2024-08-04T23:32:54.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19703 (GCVE-0-2019-19703)
Vulnerability from cvelistv5
Published
2019-12-10 19:43
Modified
2024-08-05 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/issues/1467" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-10T19:43:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/issues/1467" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19703", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ktorio/ktor/issues/1467", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/issues/1467" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19703", "datePublished": "2019-12-10T19:43:28", "dateReserved": "2019-12-10T00:00:00", "dateUpdated": "2024-08-05T02:25:12.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19389 (GCVE-0-2019-19389)
Vulnerability from cvelistv5
Published
2019-12-26 20:15
Modified
2024-08-05 02:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:16:47.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/1408" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-30T17:33:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/1408" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ktorio/ktor/pull/1408", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/1408" }, { "name": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737", "refsource": "MISC", "url": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737" }, { "name": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20", "refsource": "MISC", "url": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19389", "datePublished": "2019-12-26T20:15:55", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-08-05T02:16:47.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-48476 (GCVE-0-2022-48476)
Vulnerability from cvelistv5
Published
2023-04-24 12:21
Modified
2025-02-04 16:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48476", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T16:21:06.587649Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T16:22:45.322Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.3.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "CWE-35", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-24T12:21:25.846Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-48476", "datePublished": "2023-04-24T12:21:25.846Z", "dateReserved": "2023-04-24T12:21:17.873Z", "dateUpdated": "2025-02-04T16:22:45.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29930 (GCVE-0-2022-29930)
Vulnerability from cvelistv5
Published
2022-05-12 08:35
Modified
2024-08-03 06:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Summary
SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/2966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ktor", "vendor": "JetBrains", "versions": [ { "status": "affected", "version": "2.0.0" }, { "lessThan": "2.0.1", "status": "affected", "version": "2.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342: Predictable Exact Value from Previous Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T10:55:09", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/2966" } ], "source": { "defect": [ "KTOR-4217" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-29930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "version_affected": "=", "version_name": "2.0.0", "version_value": "2.0.0" }, { "version_affected": "\u003c", "version_name": "2.0.1", "version_value": "2.0.1" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-342: Predictable Exact Value from Previous Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "name": "https://github.com/ktorio/ktor/pull/2966", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/2966" } ] }, "source": { "defect": [ "KTOR-4217" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-29930", "datePublished": "2022-05-12T08:35:17", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45612 (GCVE-0-2023-45612)
Vulnerability from cvelistv5
Published
2023-10-09 10:20
Modified
2024-09-19 13:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ktor", "vendor": "jetbrains", "versions": [ { "lessThan": "2.3.5", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-45612", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:39:11.201954Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:59:24.883Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.3.5", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T10:20:53.533Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2023-45612", "datePublished": "2023-10-09T10:20:53.533Z", "dateReserved": "2023-10-09T10:14:58.150Z", "dateUpdated": "2024-09-19T13:59:24.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-49580 (GCVE-0-2024-49580)
Vulnerability from cvelistv5
Published
2024-10-17 13:00
Modified
2024-12-06 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 2.3.13 improper caching in HttpCache Plugin could lead to response information disclosure
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ktor", "vendor": "jetbrains", "versions": [ { "lessThan": "3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-49580", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T17:08:19.928343Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T17:08:48.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.3.13", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.13 improper caching in HttpCache Plugin could lead to response information disclosure" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-524", "description": "CWE-524", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T14:02:44.754Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2024-49580", "datePublished": "2024-10-17T13:00:16.342Z", "dateReserved": "2024-10-16T16:17:44.527Z", "dateUpdated": "2024-12-06T14:02:44.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34339 (GCVE-0-2023-34339)
Vulnerability from cvelistv5
Published
2023-06-01 18:12
Modified
2025-01-08 20:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:10:06.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34339", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T20:54:07.238104Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T20:54:43.429Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.3.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception\u0027s message" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-01T18:12:29.648Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2023-34339", "datePublished": "2023-06-01T18:12:29.648Z", "dateReserved": "2023-06-01T18:12:23.249Z", "dateUpdated": "2025-01-08T20:54:43.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-29904 (GCVE-0-2025-29904)
Vulnerability from cvelistv5
Published
2025-03-12 12:36
Modified
2025-03-12 13:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 3.1.1 an HTTP Request Smuggling was possible
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29904", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-12T13:15:19.008734Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T13:15:49.900Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "3.1.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 3.1.1 an HTTP Request Smuggling was possible" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-12T12:36:15.812Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2025-29904", "datePublished": "2025-03-12T12:36:15.812Z", "dateReserved": "2025-03-12T12:36:07.647Z", "dateUpdated": "2025-03-12T13:15:49.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-5207 (GCVE-0-2020-5207)
Vulnerability from cvelistv5
Published
2020-01-27 19:30
Modified
2024-08-04 08:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Summary
In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:09.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/1547" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ktor", "vendor": "Ktor.io", "versions": [ { "status": "affected", "version": "\u003c 1.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn\u0027t handle Content-Length and Transfer-Encoding properly or doesn\u0027t handle \\n as a headers separator." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-27T19:30:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/1547" } ], "source": { "advisory": "GHSA-xrr9-rh8p-433v", "discovery": "UNKNOWN" }, "title": "Request smuggling is possible in Ktor when both chunked TE and content length specified", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-5207", "STATE": "PUBLIC", "TITLE": "Request smuggling is possible in Ktor when both chunked TE and content length specified" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "version_value": "\u003c 1.3.0" } ] } } ] }, "vendor_name": "Ktor.io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn\u0027t handle Content-Length and Transfer-Encoding properly or doesn\u0027t handle \\n as a headers separator." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v", "refsource": "CONFIRM", "url": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v" }, { "name": "https://github.com/ktorio/ktor/pull/1547", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/1547" } ] }, "source": { "advisory": "GHSA-xrr9-rh8p-433v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-5207", "datePublished": "2020-01-27T19:30:15", "dateReserved": "2020-01-02T00:00:00", "dateUpdated": "2024-08-04T08:22:09.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25761 (GCVE-0-2021-25761)
Vulnerability from cvelistv5
Published
2021-02-03 15:21
Modified
2024-08-03 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:28.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-03T15:21:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-25761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com", "refsource": "MISC", "url": "https://blog.jetbrains.com" }, { "name": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-25761", "datePublished": "2021-02-03T15:21:13", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:28.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25763 (GCVE-0-2021-25763)
Vulnerability from cvelistv5
Published
2021-02-03 15:22
Modified
2024-08-03 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-03T15:22:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-25763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com", "refsource": "MISC", "url": "https://blog.jetbrains.com" }, { "name": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-25763", "datePublished": "2021-02-03T15:22:06", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:27.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45613 (GCVE-0-2023-45613)
Vulnerability from cvelistv5
Published
2023-10-09 10:20
Modified
2024-09-18 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Ktor before 2.3.5 server certificates were not verified
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T19:17:21.647858Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T19:18:15.214Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Ktor", "vendor": "JetBrains", "versions": [ { "lessThan": "2.3.5", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.5 server certificates were not verified" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T10:20:54.104Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2023-45613", "datePublished": "2023-10-09T10:20:54.104Z", "dateReserved": "2023-10-09T10:14:58.487Z", "dateUpdated": "2024-09-18T19:18:15.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-08-12 10:15
Modified
2024-11-21 07:15
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://github.com/ktorio/ktor/pull/3110 | Third Party Advisory | |
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/3110 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3EB1652-F3CA-41F6-904D-4E98B65E51AF", "versionEndExcluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack" }, { "lang": "es", "value": "JetBrains Ktor versiones anteriores a 2.1.0, era vulnerable a un ataque de Descarga de Archivos Reflejado." } ], "id": "CVE-2022-38179", "lastModified": "2024-11-21T07:15:56.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-12T10:15:28.843", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/3110" }, { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/3110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-184" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-697" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-27 20:15
Modified
2024-11-21 05:33
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/ktorio/ktor/pull/1547 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/1547 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D376B10-652C-4859-9DD4-98421D5D3D65", "versionEndExcluding": "1.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn\u0027t handle Content-Length and Transfer-Encoding properly or doesn\u0027t handle \\n as a headers separator." }, { "lang": "es", "value": "En Ktor versiones anteriores a 1.3.0, el tr\u00e1fico no autorizado de peticiones es posible cuando se ejecuta detr\u00e1s de un proxy que no maneja Content-Length y Transfer-Encoding apropiadamente o no maneja \\n como un separador de encabezados." } ], "id": "CVE-2020-5207", "lastModified": "2024-11-21T05:33:40.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-27T20:15:10.980", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/1547" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/1547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-12 10:15
Modified
2024-11-21 07:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://github.com/ktorio/ktor/pull/3092 | Third Party Advisory | |
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/3092 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3EB1652-F3CA-41F6-904D-4E98B65E51AF", "versionEndExcluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases" }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 2.1.0, pod\u00eda seleccionarse un proveedor de autenticaci\u00f3n err\u00f3neo en algunos casos" } ], "id": "CVE-2022-38180", "lastModified": "2024-11-21T07:15:57.073", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-12T10:15:28.920", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/3092" }, { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/3092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-09 11:15
Modified
2024-11-21 08:27
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA55E48A-58CF-476E-9377-3D215BCC5050", "versionEndExcluding": "2.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE" }, { "lang": "es", "value": "En JetBrains Ktor anterior a 2.3.5, la configuraci\u00f3n predeterminada de ContentNegotiation con formato XML era vulnerable a XXE" } ], "id": "CVE-2023-45612", "lastModified": "2024-11-21T08:27:03.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-09T11:15:11.020", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-01 19:15
Modified
2024-11-21 08:07
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "4409F54D-D894-4DBF-90AC-7E0073FBD32A", "versionEndExcluding": "2.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception\u0027s message" } ], "id": "CVE-2023-34339", "lastModified": "2024-11-21T08:07:02.697", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-01T19:15:09.283", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "cve@jetbrains.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-12 09:15
Modified
2024-11-21 06:59
Severity ?
8.7 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1.
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://github.com/ktorio/ktor/pull/2966 | Patch, Third Party Advisory | |
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/2966 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD053DA1-C2A5-4240-B204-44CE5543DD58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1." }, { "lang": "es", "value": "La implementaci\u00f3n de SHA1 en JetBrains Ktor Native 2.0.0 devolv\u00eda el mismo valor. El problema se ha solucionado en la versi\u00f3n 2.0.1 de Ktor" } ], "id": "CVE-2022-29930", "lastModified": "2024-11-21T06:59:59.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.8, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-12T09:15:14.520", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/2966" }, { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/2966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-342" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:55
Severity ?
Summary
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D602BE0-2F35-4F01-85B1-FA954D995BFB", "versionEndExcluding": "1.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default." }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 1.4.2, un conjunto de cifrado d\u00e9bil estaban habilitados por defecto" } ], "id": "CVE-2021-25763", "lastModified": "2024-11-21T05:55:23.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T16:15:14.773", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-09 15:15
Modified
2024-11-21 06:28
Severity ?
Summary
In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "48C80692-AC85-4E00-BF8B-9E32DFE4C7E8", "versionEndExcluding": "1.6.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly." }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 1.6.4, la verificaci\u00f3n de nonce durante el proceso de autenticaci\u00f3n OAuth2 es implementada incorrectamente" } ], "id": "CVE-2021-43203", "lastModified": "2024-11-21T06:28:50.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-09T15:15:10.110", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-09 11:15
Modified
2024-11-21 08:27
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
In JetBrains Ktor before 2.3.5 server certificates were not verified
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA55E48A-58CF-476E-9377-3D215BCC5050", "versionEndExcluding": "2.3.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.5 server certificates were not verified" }, { "lang": "es", "value": "En JetBrains Ktor anterior a 2.3.5, los certificados de servidor no se verificaban" } ], "id": "CVE-2023-45613", "lastModified": "2024-11-21T08:27:03.900", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-09T11:15:11.110", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "cve@jetbrains.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-10 20:15
Modified
2024-11-21 04:35
Severity ?
Summary
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/ktorio/ktor/issues/1467 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/issues/1467 | Exploit, Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFA330B1-67DD-4292-A909-1A6373D9D0EE", "versionEndIncluding": "1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location." }, { "lang": "es", "value": "En Ktor versiones hasta la versi\u00f3n 1.2.6, el cliente reenv\u00eda los datos del encabezado HTTP Authorization a una ubicaci\u00f3n de redireccionamiento." } ], "id": "CVE-2019-19703", "lastModified": "2024-11-21T04:35:13.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-10T20:15:17.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/issues/1467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/issues/1467" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF9E5E38-1336-4662-B64B-79CCE6119433", "versionEndIncluding": "1.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:ktor:1.2.0:rc:*:*:*:*:*:*", "matchCriteriaId": "7592197D-800E-4331-A0A7-EA469332AFC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials." }, { "lang": "es", "value": "La funci\u00f3n UserHashedTableAuth en el framework JetBrains Ktor versiones anteriores a 1.2.0-rc, utiliza un Hash Unidireccional con una Sal Predecible para almacenar credenciales de usuario." } ], "id": "CVE-2019-12737", "lastModified": "2024-11-21T04:23:28.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-02T19:15:14.717", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-916" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:55
Severity ?
Summary
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D720C13F-F782-4DF8-9533-9F77FEFFF2A3", "versionEndExcluding": "1.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible." }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 1.5.0, fue posible un ataque de tipo birthday en la clave de SessionStorage" } ], "id": "CVE-2021-25761", "lastModified": "2024-11-21T05:55:23.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T16:15:14.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-24 13:15
Modified
2024-11-21 07:33
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "4822E5CB-DF67-422C-88F7-C72B16704D51", "versionEndExcluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible\n" } ], "id": "CVE-2022-48476", "lastModified": "2024-11-21T07:33:24.573", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-24T13:15:07.100", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-35" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-03 20:15
Modified
2024-11-21 04:18
Severity ?
Summary
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:kotlin:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAFF22E5-5E1B-4BF3-88FB-D9A923AFFDC1", "versionEndExcluding": "1.3.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "989CF51B-94A0-47EF-8F21-4A9D200ABC78", "versionEndExcluding": "1.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30." }, { "lang": "es", "value": "Las versiones de framework Ktor de JetBrains (creadas con la plantilla IDE de Kotlin) en versiones anteriores a la 1.1.0 estaban resolviendo artefactos utilizando una conexi\u00f3n http durante el proceso de construcci\u00f3n, lo que posiblemente permit\u00eda un ataque MITM. Este problema se solucion\u00f3 en la versi\u00f3n 1.3.30 del plugin de Kotlin." } ], "id": "CVE-2019-10102", "lastModified": "2024-11-21T04:18:24.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-03T20:15:11.167", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230818-0012/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230818-0012/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-26 21:15
Modified
2024-11-21 04:34
Severity ?
Summary
JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737 | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/ktorio/ktor/pull/1408 | Mitigation, Patch, Third Party Advisory | |
cve@mitre.org | https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/1408 | Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "82889303-3C52-450B-A4A4-344A0463256E", "versionEndExcluding": "1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting." }, { "lang": "es", "value": "El framework JetBrains Ktor versiones anteriores a 1.2.6, era vulnerable a la Divisi\u00f3n de Respuesta HTTP." } ], "id": "CVE-2019-19389", "lastModified": "2024-11-21T04:34:42.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-26T21:15:11.540", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/1408" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/JLLeitschuh/6792947ed57d589b08c1cc8b666c7737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/1408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1210256191110230017?s=20" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-02 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF9E5E38-1336-4662-B64B-79CCE6119433", "versionEndIncluding": "1.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection." }, { "lang": "es", "value": "El framework JetBrains Ktor versiones anteriores a 1.2.0-rc, no sanea el nombre de usuario provisto por el usuario para el protocolo LDAP, lo que conlleva a una inyecci\u00f3n de comandos." } ], "id": "CVE-2019-12736", "lastModified": "2024-11-21T04:23:28.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-02T19:15:14.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:55
Severity ?
Summary
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "61367BA0-C605-4AD4-824D-CF6F1EA73F2B", "versionEndExcluding": "1.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible." }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 1.4.3, fue posible un Trafico No Autorizado de Peticiones HTTP" } ], "id": "CVE-2021-25762", "lastModified": "2024-11-21T05:55:23.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T16:15:14.713", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://blog.jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-11 19:15
Modified
2024-11-21 06:58
Severity ?
3.3 (Low) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Summary
In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren't using SecureRandom implementations
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://github.com/ktorio/ktor/pull/2776 | Patch, Third Party Advisory | |
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ktorio/ktor/pull/2776 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.jetbrains.com/privacy-security/issues-fixed/ | Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB77206E-B8C7-4379-A600-6DC2F1403FC6", "versionEndExcluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor Native before version 2.0.0 random values used for nonce generation weren\u0027t using SecureRandom implementations" }, { "lang": "es", "value": "En JetBrains Ktor Native versiones anteriores a 2.0.0, los valores aleatorios usados para la generaci\u00f3n de nonce no usaban implementaciones de SecureRandom" } ], "id": "CVE-2022-29035", "lastModified": "2024-11-21T06:58:22.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 2.5, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-11T19:15:08.720", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/2776" }, { "source": "cve@jetbrains.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ktorio/ktor/pull/2776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-17 13:15
Modified
2024-12-06 14:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
In JetBrains Ktor before 2.3.13 improper caching in HttpCache Plugin could lead to response information disclosure
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "34BD7712-1D07-487C-8A52-C2202C53BA2E", "versionEndExcluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 2.3.13 improper caching in HttpCache Plugin could lead to response information disclosure" }, { "lang": "es", "value": "En JetBrains Ktor anterior a la versi\u00f3n 3.0.0, el almacenamiento en cach\u00e9 incorrecto en el complemento HttpCache podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n de respuesta" } ], "id": "CVE-2024-49580", "lastModified": "2024-12-06T14:15:20.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-17T13:15:14.853", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-524" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-16 16:15
Modified
2024-11-21 05:19
Severity ?
Summary
In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EA39F6D-F439-441B-9728-9425C4A2AFFC", "versionEndExcluding": "1.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible." }, { "lang": "es", "value": "En JetBrains Ktor versiones anteriores a 1.4.1, era posible el tr\u00e1fico no autorizado de peticiones HTTP" } ], "id": "CVE-2020-26129", "lastModified": "2024-11-21T05:19:18.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-16T16:15:14.773", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }